Author of the publication

Combined Wireless Network Intrusion Detection Model Based on Deep Learning.

, , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Depression recognition based on dynamic facial and vocal expression features using partial least square regression., , , , , and . AVEC@ACM Multimedia, page 21-30. ACM, (2013)Efficient kd-tree construction for ray tracing using ray distribution sampling., , , , and . Multimedia Tools Appl., 75 (23): 15881-15899 (2016)Learning Face Age Progression: A Pyramid Architecture of GANs., , , and . CoRR, (2017)Cross-Layer Network Lifetime Maximization in Underwater Wireless Sensor Networks., , , and . IEEE Syst. J., 14 (1): 220-231 (2020)IntegratedMap: a Web interface for integrating genetic map data., , and . Bioinform., 21 (9): 2126-2127 (2005)Normalization of face illumination with photorealistic texture via deep image prior synthesis., , , , and . Neurocomputing, (2020)Network security situation assessment with network attack behavior classification., , , and . Int. J. Intell. Syst., 37 (10): 6909-6927 (2022)Quality Judgment of 3D Face Point Cloud Based on Feature Fusion., , and . IEEE Access, (2022)Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network., and . IEEE Access, (2019)Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs., , , and . IEEE Access, (2019)